Metasploit mailing list archives
Win32_Bind_Stg_Upexec Payload
From: ilcjvm at hotmail.com (jesus saves)
Date: Wed, 11 May 2005 10:10:18 -0400
Hi, I am testing the above payload within my test network. I am exploiting a W2K machine using the rpc dcom exploit module. For testing purposes, I am attempting to upload and execute "notepad.exe" on my target machine. After executing the exploit module, I notice on my target machine that "metasploit.exe" is listed in the running processes, but not notepad.exe. With this particular payload, are the executable file names renamed to "metasploit.exe" ? Thanks in advance!!! _________________________________________________________________ Don?t just search. Find. Check out the new MSN Search! http://search.msn.click-url.com/go/onm00200636ave/direct/01/
Current thread:
- Win32_Bind_Stg_Upexec Payload jesus saves (May 11)
- Win32_Bind_Stg_Upexec Payload mmiller at hick.org (May 11)